No More Ransom Helps You Prevent and Recover from Ransomware Attacks

Ransomware attacks are on the rise, and once your computer or network has been infected, it can be really difficult to recover. No More Ransom can help, and more importantly, help you now, before an infection, and later, after one. Read more…

Read more here:
No More Ransom Helps You Prevent and Recover from Ransomware Attacks

AT&T has $80 billion deal to purchase Time Warner Inc. (and with it, HBO)

Enlarge (credit: Getty Images | Tim Boyle) Following up on news reported yesterday, AT&T has reached a deal to buy Time Warner Inc. for more than $80 billion,  The Wall Street Journal wrote today . The boards of the companies are meeting today to approve the merger, “with a deal likely to be announced as soon as Saturday evening.” Original story from yesterday follows: AT&T and Time Warner Inc. have recently met “to discuss various business strategies including a possible merger,”  Bloomberg reported Thursday . Discussions are still in early stages, according to Bloomberg’s anonymous sources. “The talks, which at this stage are informal, have focused on building relations between the companies rather than establishing the terms of a specific transaction, the people said, asking not to be identified as the deliberations are private,” Bloomberg wrote. “Neither side has yet hired a financial adviser, the people said.” Read 7 remaining paragraphs | Comments

See the article here:
AT&T has $80 billion deal to purchase Time Warner Inc. (and with it, HBO)

‘Cultlike’ Devotion: Apple Once Refused To Join Open Compute Project, So Their Entire Networking Team Quit

mattydread23 writes: Great story about the Open Compute Project from Business Insider’s Julie Bort here, including this fun tidbit: “‘OCP has a cultlike following, ‘ one person with knowledge of the situation told Business Insider. ‘The whole industry, internet companies, vendors, and enterprises are monitoring OCP.’ OCP aims to do for computer hardware what the Linux operating system did for software: make it ‘open source’ so anyone can take the designs for free and modify them, with contract manufacturers standing by to build them. In its six years, OCP has grown into a global entity, with board members from Facebook, Goldman Sachs, Intel, and Microsoft. In fact, there’s a well-known story among OCP insiders that demonstrates this cultlike phenom. It involves Apple’s networking team. This team was responsible for building a network at Apple that was so reliable, it never goes down. Not rarely — never. Building a 100% reliable network to meet Apple’s exacting standards was no easy task. So, instead of going it alone under Apple’s secrecy, the Apple networking team wanted to participate in the revolution, contributing and receiving help. But when the Apple team asked to join OCP, Apple said ‘no.’ ‘The whole team quit the same week, ‘ this person told us.” Read more of this story at Slashdot.

Visit site:
‘Cultlike’ Devotion: Apple Once Refused To Join Open Compute Project, So Their Entire Networking Team Quit

Chrome 54 Arrives With YouTube Flash Embed Rewriting To HTML5

Krystalo quotes a report from VentureBeat: Google today launched Chrome 54 for Windows, Mac, and Linux. This release is mainly focused on developers, but the improvements to how the browser handles YouTube embeds is also noteworthy. You can update to the latest version now using the browser’s built-in silent updater, or download it directly from google.com/chrome. Chrome 54 rewrites YouTube Flash players to use the YouTube HTML5 embed style. YouTube ditched Flash for HTML5 by default in January 2015, but the old embeds still exist all over the web. Google says the change improves both performance and security for its desktop browser. The report adds that “Chrome also now provides support for the custom elements V1 spec, ” which allows “developers to create custom HTML tags as well as define their API and behavior in JavaScript.” BroadcastChannel API will also be implemented “to allow one-to-many messaging between windows, tabs, iframes, web workers, and service workers.” You can read more about Chrome 54 on Google’s blog post. Read more of this story at Slashdot.

Read More:
Chrome 54 Arrives With YouTube Flash Embed Rewriting To HTML5

Sprint To Provide 1 Million Students With Free Internet, Mobile Devices

An anonymous reader quotes a report from Reuters: Wireless carrier Sprint Corp on Tuesday pledged to provide 1 million U.S. high school students with free mobile devices and internet access as part of a White House initiative to expand opportunities for lower income kids. Marcelo Claure, chief executive of Sprint, said the plan builds on the company’s prior commitment through the White House’s ConnectED program to get 50, 000 students high speed internet. He said Sprint realized that while providing students with internet at school was helpful, students would still need to be able to use the internet at home. “We are going to equip 1 million kids with the tools they need to reach their full potential and achieve their dreams, ” Claure told reporters on a White House call. Sprint aims to give cell phones, tablets, laptops or mobile hot spots to students who do not have internet at home. Students would be able to choose the type of device that might meet their needs and it would be coupled with four years of free data plans. The company hopes to reach its goal of a million students in five years. Manufacturers have agreed to provide the mobile devices at no cost, Claure said. He also said the company would encourage customers to donate their old devices to the program and that it would not cost Sprint much to allow the free use of its network. Read more of this story at Slashdot.

See original article:
Sprint To Provide 1 Million Students With Free Internet, Mobile Devices

Don’t buy a Galaxy Note 7—and return yours if you already have

Enlarge / The Note 7 has too many safety issues for us to recommend. (credit: Ron Amadeo) When we review phones, we do our best to tell you everything you need to make a smart purchase. We talk about the underlying tech, too, but in the end, people usually read a review because they either want to know which thing to buy or they want to know more about the thing they already intend to buy. Usually, we give you all of that information and make a general recommendation but leave the ultimate purchasing decision up to you. But for Samsung’s Galaxy Note 7, we need to go a step further: don’t buy this phone. And if you have bought it, you should return the Galaxy Note 7 immediately and purchase something else. Read 11 remaining paragraphs | Comments

More:
Don’t buy a Galaxy Note 7—and return yours if you already have

Why the Silencing of KrebsOnSecurity Opens a Troubling Chapter For the Internet

An anonymous reader quotes a report from Ars Technica: For the better part of a day, KrebsOnSecurity, arguably the world’s most intrepid source of security news, has been silenced, presumably by a handful of individuals who didn’t like a recent series of exposes reporter Brian Krebs wrote. The incident, and the record-breaking data assault that brought it on, open a troubling new chapter in the short history of the Internet. The crippling distributed denial-of-service attacks started shortly after Krebs published stories stemming from the hack of a DDoS-for-hire service known as vDOS. The first article analyzed leaked data that identified some of the previously anonymous people closely tied to vDOS. It documented how they took in more than $600, 000 in two years by knocking other sites offline. A few days later, Krebs ran a follow-up piece detailing the arrests of two men who allegedly ran the service. A third post in the series is here. On Thursday morning, exactly two weeks after Krebs published his first post, he reported that a sustained attack was bombarding his site with as much as 620 gigabits per second of junk data. That staggering amount of data is among the biggest ever recorded. Krebs was able to stay online thanks to the generosity of Akamai, a network provider that supplied DDoS mitigation services to him for free. The attack showed no signs of waning as the day wore on. Some indications suggest it may have grown stronger. At 4 pm, Akamai gave Krebs two hours’ notice that it would no longer assume the considerable cost of defending KrebsOnSecurity. Krebs opted to shut down the site to prevent collateral damage hitting his service provider and its customers. The assault against KrebsOnSecurity represents a much greater threat for at least two reasons. First, it’s twice the size. Second and more significant, unlike the Spamhaus attacks, the staggering volume of bandwidth doesn’t rely on misconfigured domain name system servers which, in the big picture, can be remedied with relative ease. The attackers used Internet-of-things devices since they’re always-connected and easy to “remotely commandeer by people who turn them into digital cannons that spray the internet with shrapnel.” “The biggest threats as far as I’m concerned in terms of censorship come from these ginormous weapons these guys are building, ” Krebs said. “The idea that tools that used to be exclusively in the hands of nation states are now in the hands of individual actors, it’s kind of like the specter of a James Bond movie.” While Krebs could retain a DDoS mitigation service, it would cost him between $100, 000 and $200, 000 per year for the type of protection he needs, which is more than he can afford. What’s especially troubling is that this attack can happen to many other websites, not just KrebsOnSecurity. Read more of this story at Slashdot.

Visit link:
Why the Silencing of KrebsOnSecurity Opens a Troubling Chapter For the Internet

Street Fighter V will roll back request for kernel access on Windows [Updated]

Enlarge / No, not really, Capcom. (credit: Aurich Lawson) On Thursday, Street Fighter V ‘s first “season” concluded with a downloadable update that included the game’s 22nd fighting character. (If you’re curious: the new guy is Urien, a tall fellow who first appeared in Street Fighter III wearing only a thong.) But the download updated more than just the game’s roster. It also brought apparent sweeping changes to the PC version—which now demands kernel access from players before every single boot of the game. Windows’ User Account Control (UAC) system warns computer users when an application wants to write or delete sensitive files, and, in the case of PC games, you typically only see these warnings during installations. SFV’s Thursday patch, however, apparently includes “an updated anti-crack solution” that Capcom insists is “not DRM” but rather an anti-cheating protocol. The anti-crack solution is causing a UAC prompt to pop up for the PC version’s users. (Our own Aurich Lawson confirmed the news by booting the latest patched version; his Windows prompt appears above.) Unfortunately, Capcom’s public-facing messages about PC version “hacks” have not been about cheats but about players finding workarounds to unlocking in-game content. In July, Capcom issued a stern warning to any PC player who found alternate ways to unlock  Street Fighter ‘s alternate costumes, which normally require grinding through the game’s lengthy “survival” modes. Capcom producers also condemned PC players who used characters hidden in that game’s version before they were officially released. Thursday’s patch notes mentioned that the new anti-crack solution is particularly targeted at “illicitly obtaining in-game currency and other entitlements” (so it’s, you know, DRM). Read 3 remaining paragraphs | Comments

Taken from:
Street Fighter V will roll back request for kernel access on Windows [Updated]

Cops Are Raiding Homes of Innocent People Based Only On IP Addresses

Kashmir Hill has a fascinating story today on what can go wrong when you solely rely on IP address in a crime investigation — also highlighting how often police resort to IP addresses. In the story she follows a crime investigation that led police to raid a couple’s house at 6am in the morning, because their IP address had been associated with the publication of child porn on notorious 4chan porn. The problem was, Hill writes: the couple — David Robinson and Jan Bultmann — weren’t the ones who had uploaded the child porn. All they did was voluntarily use one of their old laptops as a Tor exit relay, a software used by activists, dissidents, privacy enthusiasts as well as criminals, so that people who want to stay anonymous when surfing the web could do so. Hill writes: Robinson and Bultmann had specifically operated the riskiest node in the chain: the exit relay which provides the IP address ultimately associated with a user’s activity. In this case, someone used Tor to make the porn post, and his or her traffic had been routed through the computer in Robinson and Bultmann’s house. The couple wasn’t pleased to have helped someone post child porn to the internet, but that’s the thing about privacy-protective tools: They’re going to be used for good and bad purposes, and to support one, you might have to support the other.Robinson added that he was a little let down because police didn’t bother to look at the public list which details the IP addresses associated with Tor exit relays. Hill adds: The police asked Robinson to unlock one MacBook Air, and then seemed satisfied these weren’t the criminals they were looking for and left. But months later, the case remains open with Robinson and Bultmann’s names on police documents linking them to child pornography. “I haven’t run an exit relay since. The police told me they’d be back if it happened again, ” Robinson said; he’s still running a Tor node, just not the end point anymore. “I have to take the threat seriously because I don’t want my wife or I to wake up with guns in our faces.”Technologist Seth Schoen, and EFF Executive Director Cindy Cohn in a white paper aimed at courts and cops. “For many reasons, connecting an individual to a crime linked to an IP address, without any additional investigation, is irresponsible and threatens the civil liberties of innocent people.” Read more of this story at Slashdot.

See the original post:
Cops Are Raiding Homes of Innocent People Based Only On IP Addresses

Anonymous Hacker Explains His Attack On Boston Children’s Hospital

Okian Warrior writes: Martin Gottesfeld of Anonymous was arrested in connection with the Spring 2014 attacks on a number of healthcare and treatment facilities in the Boston area. The attacks were in response/defense of a patient there named Justina Pelletier. Gottesfeld now explains why he did what he did, in a statement provided to The Huffington Post. Here’s an excerpt from his statement: [Why I Knocked Boston Children’s Hospital Off The Internet] The answer is simpler than you might think: The defense of an innocent, learning disabled, 15-year-old girl. In the criminal complaint, she’s called ‘Patient A, ‘ but to me, she has a name, Justina Pelletier. Boston Children’s Hospital disagreed with her diagnosis. They said her symptoms were psychological. They made misleading statement on an affidavit, went to court, and had Justina’s parents stripped of custody. They stopped her painkillers, leaving her in agony. They stopped her heart medication, leaving her tachycardic. They said she was a danger to herself, and locked her in a psych ward. They said her family was part of the problem, so they limited, monitored, and censored her contact with them…” Read more of this story at Slashdot.

Visit site:
Anonymous Hacker Explains His Attack On Boston Children’s Hospital